Overview
overview
10Static
static
10EMPRESS/EMP.dll
windows7-x64
9EMPRESS/EMP.dll
windows10-2004-x64
9EMPRESS/am...64.dll
windows7-x64
9EMPRESS/am...64.dll
windows10-2004-x64
9EMPRESS/re4.exe
windows7-x64
1EMPRESS/re4.exe
windows10-2004-x64
1EMPRESS/st...64.dll
windows7-x64
1EMPRESS/st...64.dll
windows10-2004-x64
1EMPRESS/st...64.dll
windows7-x64
1EMPRESS/st...64.dll
windows10-2004-x64
3Extras/Res...er.exe
windows7-x64
1Extras/Res...er.exe
windows10-2004-x64
1Analysis
-
max time kernel
14s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18-05-2023 13:23
Behavioral task
behavioral1
Sample
EMPRESS/EMP.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
EMPRESS/EMP.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
EMPRESS/amd_ags_x64.dll
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
EMPRESS/amd_ags_x64.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
EMPRESS/re4.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
EMPRESS/re4.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
EMPRESS/steam_api64.dll
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
EMPRESS/steam_api64.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
EMPRESS/steam_api64.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
EMPRESS/steam_api64.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
Extras/Resident Evil 4 v1.0-v20230424 Plus 36 Trainer.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
Extras/Resident Evil 4 v1.0-v20230424 Plus 36 Trainer.exe
Resource
win10v2004-20230220-en
General
-
Target
EMPRESS/EMP.dll
-
Size
16.5MB
-
MD5
152271c4b4ffef688f8afe097989b224
-
SHA1
df3bb0aa3f2ca3e27092b1ee2b316afa5234586f
-
SHA256
1a810d11ff37b79a348ceb52fe3a6c5b7aa83682ecff88764a78a92586c2803e
-
SHA512
33dd3768e24628294239acea1e86d158c049fb5dc937092cbe6abee77afd2c2165bedc070047ad553c01e6fae33409284d2f9a960368f17c92a83457f60a41be
-
SSDEEP
393216:6Wj4j1GtzkONfyf9Mah58FSz2pARmnfZQpeWeYO7Uy+JEMUv:6WaGtzkONk9huIRmnfZHDjIynB
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe